Read on to meet the new GovLoop Featured Contributors, who will be posting once a week for the next two months. We’re excited to introduce you to them – and even more excited to read what they’ll be writing about.
Search Results for: cio
5 Things You Need to Know About Federal News From the Past Month
Changes in federal government keep coming fast. That’s why GovLoop gives you monthly recaps of federal news that may affect agency management and employment. If you’ve fallen behind, check out the previous recaps. By the time you read this, there will undoubtedly be new developments. Also, this roundup can’t include everything. The focus is on federal news mostRead… Read more »
Cultivating the Qualities to Lead
Good leadership comes from conscious cultivation of the qualities it takes to effectively connect with and inspire others.
One State is One State – Breaking Down the Myth of Universal State IT
Penned in the 1960s, the “Fifty Nifty United States” song is a favorite of 3rd grade classrooms across the country. But is it’s mantra true, that every state really is unique, and if so, does that uniqueness extend to IT.
What I Learned on my Journey to Leadership
#1: Assumption of authority is a myth; real leadership is earned.
Are Agencies Discouraging Cyber Recruits?
The answer may come from how agencies are discussing cybersecurity with potential employees. Too many agencies may present cybersecurity as a losing battle.
A New Era of Cybersecurity: Zero Trust
Cybersecurity seems simple enough. The old methodology went something along the lines of installing a strong IT network, training employees to identify and avoid risks, and locking down the most sensitive information in-house.
Health and Wellness at Work and at Home
In today’s busy world, finding time to look after your health and well-being is more important than ever.
DHS Official: ‘Agency Heads, You’re Accountable for Your Cybersecurity’
The Homeland Security Department is taking a multi-pronged approach to cybersecurity — one that will more clearly define its role and expectations of agencies.
Your Devices Are in Danger
Today’s cyberthreats include foreign governments, criminals, hacktivists and terrorists. Their motivations range from financial gain to hurting the U.S.